Advertisement






eClass LMS 2.6 Shell Upload

CVE Category Price Severity
CVE-2016-8840 CWE-434 $500 High
Author Risk Exploitation Type Date
Pouyan Khatami Critical Remote 2020-12-02
CVSS EPSS EPSSP
CVSS:4.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 0.12 0.147

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2020120009

Below is a copy:

eClass LMS 2.6 Shell Upload
<--

# Exploit Title: eClass - Learning Management System Arbitrary File Upload
# Google Dork: N/A
# Date: 30/11/2020
# Exploit Author: Sohel Yousef - [email protected]
# Software Link:https://mediacity.co.in/eclass
# Software link 2:
https://codecanyon.net/item/eclass-learning-management-system/25613271
# Software Demo :https://mediacity.co.in/eclass/demo/public/
# Version:  ( Version 2.6 )
# Category: webapps

1. Description

eclass learning script contain arbitrary file upload
registered user can upload .php files in profile picture section without
any security

profile link :

localhost /eclass/demo/public/profile/show/

edit profile photo and upload php files and inspect element your php
direction

uploaded file direction

local host /eclass/demo/public/images/user_img/16067501901.php <---- random
id

just right click the photo and use inspect element you will have your
direction

#####

-->

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum